Phishing Attacks Prevention

Phishing attacks are the most commonly reported case form of cyber attack, and keeping up with the methods of some phishing attacks are proving to be very difficult but ways we will teach you to prevent them.

There are various types of phishing attacks and the type that is used usually those are the ways phisher normally use.

Phishing Example 1 - Too-good-to-be-true offers on social media.

If you ever see an ad on Facebook, Instagram or Twitter promoting a great discount, a FREE gift certificate or a giveaway from a reputable company, just STOP. THINK. Is that legit? In most cases, these too-good-to-be-true offers on social media are meant to compromise your internet security. They're usually surveying scams promoted by phishers who want you to fill in an online survey with your account credentials and other personal details – sometimes even credit card numbers. In exchange, you’ll supposedly receive the promised items. But after you give away your details, the items in question never reach you.

Phishing Example 2 - Phony job ads.

Are you desperately looking for a job? Or want to change the one you have? Bear in mind that phishers have made a habit out of targeting job hunters, taking advantage of their need to put their internet security at risk. They post phony ads all over the web, even on well-known job sites, and sometimes send them via e-mail.The ads look legitimate, displaying company logos and appropriate language, but once you click on the links they provide, you are taken to a fake site where you have to enter personal details. Usually, after a few days, the phishers close down the site and remove the ads.

Phishing Example 3 - Fake warnings from banks.

Your bank would never send you warning messages saying your credit card has expired and urging you to hand over banking details. But fraudsters would. If you ever receive such an e-mail or text message, you’re probably facing a phishing scam.

Phishing Example 4 - Charity scams.

Whenever you hear about a natural disaster and global health issues involving helpless children, you wish you could do something to help out. While there are reputable organizations that gather donations, there are also cybercrooks who want to take advantage of your generosity. They send e-mails or post touching messages on online forums, asking you to donate money to a reputable charity. When you click on the embedded link you go to a phishing site where you’re tricked into giving away your credit card details.

Phishing Example 5 - Fake e-cards.

Every holiday is a reason for joy and sharing that joy with people you know, even if you’re on different continents. And e-cards seem the easiest way to do that. Even companies have adopted the practice of sending e-cards to their customers to get closer to them. Not at all surprising is the fact that cybercrooks know just how to take advantage of the joy-spreading e-cards and breach your internet security. They send you legit-looking e-cards that once downloaded or clicked on, they either direct you to a phishing site or install some kind of malicious software on your PC.

So here you go that's the 5 types of phishing attack commonly used by a phisher. See you on our next post! Make sure to keep your wallet and identity safe!